Network Security Analysis and Defense Strategies
碩士 === 東海大學 === 資訊工程與科學系碩士在職專班 === 91 === An Intrusion detection system (IDS) generally focuses on the analysis and detection of network anomalies. In fact, all the messages that might threaten a network system and the behaviors of improper network accesses are those should be analyzed when one trie...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/96070601703342247655 |
id |
ndltd-TW-091THU00392004 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-091THU003920042016-06-13T04:16:31Z http://ndltd.ncl.edu.tw/handle/96070601703342247655 Network Security Analysis and Defense Strategies 網路安全威脅分析與防制策略 Chiin-Wei Su 蘇俊維 碩士 東海大學 資訊工程與科學系碩士在職專班 91 An Intrusion detection system (IDS) generally focuses on the analysis and detection of network anomalies. In fact, all the messages that might threaten a network system and the behaviors of improper network accesses are those should be analyzed when one tries to detect network attacks. In order to improve security degree of a network, we should analyze all kinds of network threats and establish a proper access and monitoring mechanism. In this paper, we first study how intruders gather network packets or obtain illegal access authority by hacking network drawbacks. Second, we discuss how intruders use rarely monitored packets and tunnel to build backdoors for stealing information from information systems, and the way they perform connection hijacking by using spoofing IP and TCP sequence number surmise. Third, how intruders obtain system accounts through security weakness of an operation system is stated. Forth, we describe how hackers make use of undetectable methods to scan network systems to avoid detection by some security mechanism. Finally, we study intrusion procedures and trends, and provide suggestions for network administrator to set up a safer network environment. The purposes are to increase the difficulties of intrusion and illegal accesses to network facilities so as network security can be dramatically improved. Fang-Yie Leu 呂芳懌 2003 學位論文 ; thesis 93 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 東海大學 === 資訊工程與科學系碩士在職專班 === 91 === An Intrusion detection system (IDS) generally focuses on the analysis and detection of network anomalies. In fact, all the messages that might threaten a network system and the behaviors of improper network accesses are those should be analyzed when one tries to detect network attacks. In order to improve security degree of a network, we should analyze all kinds of network threats and establish a proper access and monitoring mechanism. In this paper, we first study how intruders gather network packets or obtain illegal access authority by hacking network drawbacks. Second, we discuss how intruders use rarely monitored packets and tunnel to build backdoors for stealing information from information systems, and the way they perform connection hijacking by using spoofing IP and TCP sequence number surmise. Third, how intruders obtain system accounts through security weakness of an operation system is stated. Forth, we describe how hackers make use of undetectable methods to scan network systems to avoid detection by some security mechanism. Finally, we study intrusion procedures and trends, and provide suggestions for network administrator to set up a safer network environment. The purposes are to increase the difficulties of intrusion and illegal accesses to network facilities so as network security can be dramatically improved.
|
author2 |
Fang-Yie Leu |
author_facet |
Fang-Yie Leu Chiin-Wei Su 蘇俊維 |
author |
Chiin-Wei Su 蘇俊維 |
spellingShingle |
Chiin-Wei Su 蘇俊維 Network Security Analysis and Defense Strategies |
author_sort |
Chiin-Wei Su |
title |
Network Security Analysis and Defense Strategies |
title_short |
Network Security Analysis and Defense Strategies |
title_full |
Network Security Analysis and Defense Strategies |
title_fullStr |
Network Security Analysis and Defense Strategies |
title_full_unstemmed |
Network Security Analysis and Defense Strategies |
title_sort |
network security analysis and defense strategies |
publishDate |
2003 |
url |
http://ndltd.ncl.edu.tw/handle/96070601703342247655 |
work_keys_str_mv |
AT chiinweisu networksecurityanalysisanddefensestrategies AT sūjùnwéi networksecurityanalysisanddefensestrategies AT chiinweisu wǎnglùānquánwēixiéfēnxīyǔfángzhìcèlüè AT sūjùnwéi wǎnglùānquánwēixiéfēnxīyǔfángzhìcèlüè |
_version_ |
1718302859719606272 |